PacktPublishing / Learning-Python-for-Forensics-Second-EditionLinks
Learning Python for Forensics, Second Edition, Published by Packt
☆47Updated 2 years ago
Alternatives and similar repositories for Learning-Python-for-Forensics-Second-Edition
Users that are interested in Learning-Python-for-Forensics-Second-Edition are comparing it to the libraries listed below
Sorting:
- Python Digital Forensics Cookbook, published by Packt☆103Updated 2 years ago
- Python Digital Forensics [video], published by Packt☆20Updated 2 years ago
- Learning Python for Forensics by Packt Publishing☆120Updated 2 years ago
- Advanced Malware Analysis [video], published by Packt☆21Updated 2 years ago
- Python Digital Forensics Cookbook by Packt☆17Updated 5 years ago
- Code for the Python Digital Forensics Cookbook☆61Updated 7 years ago
- Hands-On Penetration Testing with Python, published by Packt☆82Updated last year
- Python Penetration Testing for Developers, published by Packt☆39Updated 2 years ago
- Tools for DFIR☆120Updated 7 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Mastering Malware Analysis, published by Packt☆39Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- A repo to support the book☆42Updated 2 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆64Updated 2 years ago
- ☆89Updated this week
- Tool used to perform threat intelligence against packet data☆35Updated 5 months ago
- ☆23Updated 4 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Cyber Threat Intelligence - Toolbox☆51Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆58Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- ☆39Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Malware Analysis Techniques, published by Packt☆72Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆131Updated last year
- Defensive Origins Training Schedule☆38Updated last year
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Updated 4 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago